Gartner Cloud DBMS Report Names MarkLogic a Visionary

MarkLogic Security Workshop – Coming to a City Near You

Another day, another security breach.

At least that’s what it feels like lately. The attacks take many different shapes and forms. From the high profile, massive scale breaches of consumer credit data to the theft of mobile phone user data. And no organization is immune. There have even been ransomware attacks on fuzzy talking teddy bears Teddy bears!!

As business leaders and technologists we are challenged each day to make decisions and implement systems that place security as a top priority. Doing so reduces risk and protects our customers and business. But we’re also faced with intense pressure to deliver new applications and data services faster than ever before.

Fortunately, time to market and information security don’t need to be at odds with one another.
Customers choose NoSQL technology because of the agility, flexibility, scalability and speed it provides.

And you have chosen MarkLogic NoSQL because of its enterprise capabilities and proven, certified security model. In this FREE workshop, you will learn hands-on how to use MarkLogic to implement security inside the database. You will also get to hear from industry leaders to gain insight into real-world examples of security concepts in action.


Why You Need to Attend

What you will learn: Why it is important:
How to design and implement role-based access control to secure information in the database. Users should be given access to the least amount of information that is needed in order for them to do their jobs. By implementing roles and permissions you can be restrictive, but also flexible, so that you create a model that is easy to manage over time.
How to control access to data on a granular level Some people need access to certain bits of information but not to other bits. Information within the database can be protected at the XML element or JSON property level. This enables you to restrict user access to certain parts of a document – or to prevent a user from even knowing that those parts exist.
How to implement encryption. External hackers aren’t the only threat. There is also the threat from internal sources. How do you protect against a rogue DBA or system administrator? Encryption enables you to encrypt the data in the database (including logs and configuration files). Key management to the encrypted data enables you to limit the power of an individual, so that even if someone with access to the disk was to steal data and take it offsite, they couldn’t use that data without the keys.

Hurry! Spaces Are Limited — Register Today!

Greg Nist - Director, Training and Community | MarkLogic

Start a discussion

Connect with the community

STACK OVERFLOW

EVENTS

GITHUB COMMUNITY

Most Recent

View All

Digital Acceleration Series: Powering MDM with MarkLogic

Our next event series covers key aspects of MDM including data integration, third-party data, data governance, and data security -- and how MarkLogic brings all of these elements together in one future-facing, agile MDM data hub.
Read Article

Of Data Warehouses, Data Marts, Data Lakes … and Data Hubs

New technology solutions arise in response to new business needs. Learn why a data hub platform makes the most sense for complex data.
Read Article

5 Key Findings from MarkLogic-Sponsored Financial Data Leaders Study

Financial institutions differ in their levels of maturity in managing and utilizing their enterprise data. To understand trends and winning strategies in getting the greatest value from this data, we recently co-sponsored a survey with the Financial Information Management WBR Insights research division.
Read Article
This website uses cookies.

By continuing to use this website you are giving consent to cookies being used in accordance with the MarkLogic Privacy Statement.